**Guest Speaker-Security Clearances

peanutunderwearΛογισμικό & κατασκευή λογ/κού

7 Νοε 2013 (πριν από 4 χρόνια)

100 εμφανίσεις

High School/ Cyber
STEM

Summer

2 Week

Based 6 hours a day

Week 1


Meeting

Content

1

Welcome & Logistics

Hard Drive Introductions Warm
-
Up

Three Questions

Overview of Information Assurance, Information Security, and Digital
Forensics

si摥漠乓A

㐠敬敭敮e猠

f湴n杲楴g C潮fi摥湴楡lity

si摥漠卮o灰整猯 NpA C Cy扥rt慴捨⁄ca

Tra湳nti潮 t漠䍯m灵tati潮慬 T桩nking

r湰lu杧e搠䅣divity


e潯k

f湴r潤畣瑩u渠to py湴慸

f湴r潤畣瑩u渠to Mi捲ot潲o摳dfor m畬tim敤ia 捲敡ti潮



f湴r潤畣瑩un
P潷敲偯i湴n


th敲e 䱯杯 䱡ng畡g攠fit
s i渠


Ber歬敹 l潧漠慮搠t桥
潴桥o fr敥 log潳

䱏il l慮g畡geW aiff敲e湣n猠扥tw敥渠f畮捴i潮慬 C im灥rativ攠
灲pgramming l慮g畡g敳

䱩獰⁤s慬散e

pkill a敶敬潰m敮t wit栠hi捲otorl摳

e慴捨a湧 愠Turtle

B慳a挠C潭o慮ds
-

f湤數 C慲搠wit栠䉡獩挠Comma湤s

p桡灥猠bx敲捩獥

o
数敡e

C潮v敲ei湧 t漠or潣o摵re

dr慰桩捳/ A湩mati潮

Pr潧r慭 t桥 t畲tl攠eo 慶潩搠d桥 桡z慲a

A湮潵湣n 捯cm慮d

C潯r摩湡t敳f t畲tle

B畴u潮sW N敷 P慧e/ A摤 愠偡ge, o敳et

pli摥r猺 獰s敤 慮搠摩r散ti潮

Mi捲otorl摳
T敡m

C桡ll敮geW A湩mat敤 pt潲o 潲 d慭a o敬慴敤ato
Cy扥r獥捵rity

2

T
eam Challenges Continued: MicroWorlds

Identity Management : Digital Footprints/ Digital Fossils

Online Reputation Management PowerPoint

Digital Dossier Video

**
Guest Speaker
-
Security
Clearances


Cybersecurity V
ideo

CyberWatch with Presenter’s Guide

Pr潧r慭ming wit栠䕸捥c

b湣特灴楮g 䙩l敳

ff, A湤, 慮d lr f畮cti潮猠慮搠d桥 捯c湥cti潮猠to Mi捲otorl摳

P慳獷潲搠Pr潴散ti湧 tork扯oks

a慴愠s慬i摡ti潮

C潮摩ti潮慬 䙯rmatting

䱯捫in朠䍥lls

bx捥c C桡ll敮g攺 n畩z 潲 Cr潳獷潲搠P畺zle

Meeting

Content

3

Disaster Recovery

Backing up

Teacher PowerPoint and Demonstration using a Thumb drive or
external drive

Simulation/Game Development in Scratch

PowerPoint with build in videos

Watch Sample projects

Decoding the

Samples

Conditional Formatting connections with Excel and MicroWorlds

Sprite Basics

Creating your own Sprite

Name Letter Drop Activity

Animating a Sprite

Adding Sound

Back Spin Activity

Scratch Challenge:


Create an animation, simulation, game
,
interactive project to teach someone about an
IA/IS/Cybersecurity career or about cyberethics, cybersafety
and cybersecurity.

4

CyberWatch exercise on

Ping,

Tracerout
,
e

How Internet traffic works video

PowerPoint if you can’t actually do the ping or
tracerout

**
Guest Speaker
: Forensics

Digital Forensics

using Wireshark, SANS toolkit, FTK Image Lite, or
EnCase

Digital Forensics: collecting, handling, reporting evidence

Cell Phone forensics where available



Citizen engineer

5

Hardware Exploration
using Hardware Kits


Configuring a Virtual Networking using Cisco Packet Tracer

Packets Protocols and Ports

Show and Share MicroWorlds, Excel and Scratch Products


*Alice and Google SketchUp can also be included.



High School/
Cyber
STEM

Summer

2 Week

Based 6 hours a day

Week 2

6

Introduction to Cryptography

Cryptography PowerPoints/E
xercises

Caesar Cipher

Substitutions Cipher

Steganography

Paper Enigma Exercise

Robotics Basics

Begin Assembling the LEGO Mindstorms Robotics Kits

Beginning Syntax

7

**
Field Trip: NSA


National Cryptographic Museum and
Career/Scholarship talk

Finish Assembling the Lego Mindstorms Robotics Kits

Mini Challenge: follow a line

Mini Challenge: go up to a wall and reverse without touching the
wall

Mini Challenge: Enter and
exit a key

Robotics

Master
Challenge Program the robot to use the sensors to
stay within limited area while pushing cans out of this area

Introduction to Raptor: Program Structure, Statements/Symbols, Variables,
Comments

Raptor Programming Challenge:
Create a program

that prompts a
user to input the diameter of the circle and output the
area.

8

LegoMindstorm

Mini Challenge: follow a line

Mini Challenge: go up to a wall and reverse without touching the
wall

Mini Challenge: Enter and exit a key

Robotics

Master
Challenge Program the robot to use the sensors to
stay within limited area while pushing cans out of this area

Advanced Raptor Programming: Loops

Advanced Raptor Programming Challenge: Work in a team to design and
build a Raptor program to

create secure passwords or phases

Introduce Python Programming: Using the Python Interpreter, Using Python
as a Calculator

Python Challenge: Create a

simple

Python calculator

9

Prepare for Student Showcase Day today:

Complete an
y

unfinished challenges

Queue Excel, MicroWorlds, Scratch, Raptor and Python projects on
computers

Student Showcase

10

Carefully disassembly the LEGO Mindstorms robot


NetSmartz videos:
Information Travels
,
Offline Consequences

and
Social
Networking

Student Team Research: Studen
t teams research and present a list of best
practices one of the following topics:

Social networking; New
computer best practice; Reputation and identity management;
Disaster prevention and recovery for home computers; Using
copyrighted materials legally.





High School/
Cyber
STEM

Summer

3 Week

Based 6 hours a day

Week 1


Meeting

Content

1

Welcome & Logistics

Overview of Information Assurance, Information Security, and Digital
Forensics

Video Snippets/ NSA & CyberWatch DVD

Cybersecurity Video

Introduction to Syntax

Introduction to MicroWorlds for multimedia creation

LOGO language: Differences between functional & imperative
programming languages

Lisp dialect

Skill Development with MicroWorlds

MicroWorlds

Team Challenge:
Create an A
nimated Story

or Game
Related to Cybersecurity

2

Identity Management : Digital Footprints/ Digital Fossils

Reputation Management

**
Guest Speaker
-
Security Clearances


Advanced Microworlds: Conditional Statements, Creating animated
graphics

T
eam Challenges Continued:

Work in teams and use advanced
MicroWorlds skills to create an animated story or game
related to c
ybersecurity

or reputation management

3

**
Guest Speaker
:
Intrusion Detection and Prevention

Programming with Excel

Review Examples

Mini Challenge: Reverse
engineer an example and create a new
game related to Cybersecurity

Excel Challenge: Quiz or Crossword Puzzle

4


Ping and Tracerouting


**
Guest Speaker
: Forensics

Digital Forensics

using Wireshark, SANS toolkit, FTK Image Lite, or
EnCase

Digital Forensics:

collecting, handling, reporting evidence

Cell Phone forensics where available

5

**
Field Trip: Lazarus Foundation or
Hardware Exploration using
Hardware Kits


Configuring a Virtual Networking using Cisco Packet Tracer

Packets Protocols and Ports

Show and
Share MicroWorlds

and

Excel
Challenge work




High School/
Cyber
STEM

Summer

3 Week

Based 6 hours a day

Week 2

6

**
Guest Speaker
:
Disaster Recovery or Security Audits

Disaster Recovery, Backing up

Simulation/Game Development in Scratch

Watch Sample
projects

Sprite Basics

Creating your own Sprite

Animating a Sprite

Adding Sound

Scratch Challenge:


Create an animation, simulation, game,
interactive project to teach someone about an
IA/IS/Cybersecurity career or about cyberethics, cybersafety
and cybers
ecurity.

7

Cryptography exercises

**
Field Trip: NSA


National Cryptographic Museum and
Career/Scholarship talk

Paper Enigma Exercise

https and
E
ncryption

**Guest Speaker:
The I
mpact of Online Public Records on Identity
Theft

8

**
Guest Speaker
:
Wireless
Security

Raptor Programming

Introduction to Raptor: Program Structure, Statements/Symbols,
Variables, Comments

Raptor Programming Challenge: Create a program

that prompts a
user to input the diameter of the circle and output the
area.

9

**Guest Speaker
:
CyberCrime

Advanced Raptor Programming


Advanced Raptor Programming: Loops

Advanced Raptor Programming Challenge: Work in a team to
design and build a Raptor program to create secure
passwords or phases

10

**
Field Trip: National Crimes Museum Trip


Robotics Basics

Assemble

the LEGO Mindstorms Robotics Kits




High School/
Cyber
STEM

Summer

3 Week

Based 6 hours a day

Week
3

11

**Guest Speaker
:
Secret Service

Robotics Challenge Program the robot to use the sensors to stay within
limited area while pushing cans out of this area

Introduction to Python Programming: Basic Syntax, Hello world!, Data
types, Operators, Flow Control, Functions

12


**Guest Speaker
:
Insecurities in Universal Plug and Play

Python Programming: Using the Python Interpreter,
editing a simple python
program, creating python programs

Python Challenge: Create a

simple

Python calculator


13


Python or Raptor Team Challenge: Work in a team to

Design and
implement a Python or Raptor program which teaches someone about
cybersecurity or and information assurance job.

14

Prepare for Student Showcase Day today:

Complete an
y

unfinished challenges

Queue Excel, MicroWorlds, Scratch, Raptor and
Python projects on
computers

Student Showcase

15

Carefully disassembly the LEGO Mindstorms robot


NetSmartz videos:
Information Travels
,
Offline Consequences

and
Social
Networking

Student Team Research: Student teams research and present a list of best
practices one of the following topics:

Social networking; New
computer best practice; Reputation and identity management;
Disaster prevention and recovery for home computers; Using
c
opyrighted materials legally.

** Field trips and Speakers are based on availability.

Suggested CyberWarrior for the Baltimore
-
Washington Metropolitan area include:

International Spy Museum
http://www.spymuseum.org/

National Cryptologic Museum and NSA Career/Scholarship Talk
http://www.nsa.gov/about/cryptologic_heritage/museum/

National Electronics Museum
http://www.nationalelectronicsmuseum.org/

National Museum of Crime and Punishment:
http://www.crimemuseum.org/

The Lazarus Foundation:
http://www.lazarus.org/

Suggested Speakers for the CyberWarrior program include:

Security Clearances

Digital Forensics

Secret Service

Penetration Testing

Disaster Recovery

CyberCrime

Network Security and the Informatio
n Security CTE track

Security Audits

The impact of Online Public Records on Identity Theft

Social Engineering Techniques

Protection of Personally Identifiable Information

Updates and Patch Management

Insecurities in Universal Plug and Play

Operational Secu
rity

Careers in CyberSecurity

Incident Response

Intellectual Property Issues

Wireless Security

Intrusion Detection and Prevention